default search action
Sourav Sen Gupta 0001
Person information
- affiliation: imec, Leuven, Belgium
- affiliation (former): Nanyang Technological University, Singapore
- affiliation (former): Indian Statistical Institute, Cryptology and Security Research Unit, Kolkata, India
Other persons with the same name
- Sourav Sengupta 0002 — The Pennsylvania State University, PA, USA
- Sourav Sengupta 0003 — West Bengal University of Technology, Kolkata, India
- Sourav Sengupta 0004 — Norwegian University of Science and Technology, Trondheim, Norway
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i9]Joyjit Kundu, Wenzhe Guo, Ali BanaGozar, Udari De Alwis, Sourav Sengupta, Puneet Gupta, Arindam Mallik:
Performance Modeling and Workload Analysis of Distributed Large Language Model Training and Inference. CoRR abs/2407.14645 (2024) - 2022
- [c21]Sreejit Chaudhury, Ajeet Kumar, Subhamoy Maitra, Somjit Roy, Sourav Sen Gupta:
A Heuristic Framework to Search for Approximate Mutually Unbiased Bases. CSCML 2022: 208-223 - [c20]Voon Hou Su, Sourav Sen Gupta, Arijit Khan:
Automating ETL and Mining of Ethereum Blockchain Network. WSDM 2022: 1581-1584 - [c19]Friedhelm Victor, Bernhard Haslhofer, Sourav Sen Gupta, Malte Möser, Rainer Böhme:
CAAW'22: 2022 International Workshop on Cryptoasset Analytics. WWW (Companion Volume) 2022: 464-466 - 2021
- [c18]Lin Zhao, Sourav Sen Gupta, Arijit Khan, Robby Luo:
Temporal Analysis of the Entire Ethereum Blockchain Network. WWW 2021: 2258-2269 - 2020
- [c17]Xi Tong Lee, Arijit Khan, Sourav Sen Gupta, Yu Hann Ong, Xuan Liu:
Measurements, Analyses, and Insights on the Entire Ethereum Blockchain Network. WWW 2020: 155-166
2010 – 2019
- 2019
- [j7]Prasanna Ravi, Zakaria Najm, Shivam Bhasin, Mustafa Khairallah, Sourav Sen Gupta, Anupam Chattopadhyay:
Security is an architectural design constraint. Microprocess. Microsystems 68: 17-27 (2019) - [j6]Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Sourav Sen Gupta:
On Random Read Access in OCB. IEEE Trans. Inf. Theory 65(12): 8325-8344 (2019) - [c16]Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin:
Improving Speed of Dilithium's Signing Procedure. CARDIS 2019: 57-73 - [c15]Nandish Chattopadhyay, Anupam Chattopadhyay, Sourav Sen Gupta, Michael Kasper:
Curse of Dimensionality in Adversarial Examples. IJCNN 2019: 1-8 - [e1]Feng Hao, Sushmita Ruj, Sourav Sen Gupta:
Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings. Lecture Notes in Computer Science 11898, Springer 2019, ISBN 978-3-030-35422-0 [contents] - [i8]Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin:
Security is an Architectural Design Constraint. IACR Cryptol. ePrint Arch. 2019: 182 (2019) - [i7]Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin:
Improving Speed of Dilithium's Signing Procedure. IACR Cryptol. ePrint Arch. 2019: 420 (2019) - 2018
- [c14]Sananda Mitra, Sumanta Bose, Sourav Sen Gupta, Anupam Chattopadhyay:
Secure and Tamper-resilient Distributed Ledger for Data Aggregation in Autonomous Vehicles. APCCAS 2018: 548-551 - [c13]Mayank Raikwar, Subhra Mazumdar, Sushmita Ruj, Sourav Sen Gupta, Anupam Chattopadhyay, Kwok-Yan Lam:
A Blockchain Framework for Insurance Processes. NTMS 2018: 1-4 - [i6]Wesley Joon-Wie Tann, Xing Jie Han, Sourav Sen Gupta, Yew-Soon Ong:
Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Vulnerabilities. CoRR abs/1811.06632 (2018) - 2017
- [c12]Vineet Kumar, Aneek Roy, Sourya Sengupta, Sourav Sen Gupta:
Parallelized Common Factor Attack on RSA. ICISS 2017: 303-312 - 2015
- [j5]Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. Des. Codes Cryptogr. 77(1): 231-253 (2015) - 2014
- [j4]Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher. J. Cryptol. 27(1): 67-108 (2014) - [c11]Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar:
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. FSE 2014: 350-369 - 2013
- [j3]Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid:
Designing integrated accelerator for stream ciphers with structural similarities. Cryptogr. Commun. 5(1): 19-47 (2013) - [j2]Pantelimon Stanica, Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra, Nirupam Kar:
Counting Heron triangles with Constraints. Integers 13: A3 (2013) - [j1]Sourav Sen Gupta, Anupam Chattopadhyay, Koushik Sinha, Subhamoy Maitra, Bhabani P. Sinha:
High-Performance Hardware Implementation for RC4 Stream Cipher. IEEE Trans. Computers 62(4): 730-743 (2013) - [c10]Sheethal Kumar, Pai B. J. Jaipal, Sourav Sen Gupta, Vigesh R. Ungrapalli:
Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing. ICISS 2013: 199-213 - [c9]Subhamoy Maitra, Sourav Sen Gupta:
New Long-Term Glimpse of RC4 Stream Cipher. ICISS 2013: 230-238 - [c8]Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra:
Error Correction of Partially Exposed RSA Private Keys from MSB Side. ICISS 2013: 345-359 - [i5]Sourav Sen Gupta, Subhamoy Maitra, Willi Meier:
Distinguishing WPA. IACR Cryptol. ePrint Arch. 2013: 476 (2013) - [i4]Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. IACR Cryptol. ePrint Arch. 2013: 502 (2013) - 2012
- [i3]Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid:
Designing Integrated Accelerator for Stream Ciphers with Structural Similarities. IACR Cryptol. ePrint Arch. 2012: 48 (2012) - 2011
- [c7]Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta:
Attack on Broadcast RC4 Revisited. FSE 2011: 199-217 - [c6]Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid:
HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers. INDOCRYPT 2011: 196-215 - [c5]Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
Proof of Empirical RC4 Biases and New Key Correlations. Selected Areas in Cryptography 2011: 151-168 - [i2]Manosij Ghosh Dastidar, Sourav Sen Gupta:
Generalization of a few results in Integer Partitions. CoRR abs/1111.0094 (2011) - [i1]Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
RC4: (Non-)Random Words from (Non-)Random Permutations. IACR Cryptol. ePrint Arch. 2011: 448 (2011) - 2010
- [c4]Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta:
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits. AFRICACRYPT 2010: 82-99 - [c3]Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra:
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions. INDOCRYPT 2010: 2-16 - [c2]Sourav Sen Gupta, Koushik Sinha, Subhamoy Maitra, Bhabani P. Sinha:
One Byte per Clock: A Novel RC4 Hardware. INDOCRYPT 2010: 347-363 - [c1]Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta:
Publishing Upper Half of RSA Decryption Exponent. IWSEC 2010: 25-39
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-25 19:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint